EX413K: Red Hat® Certificate of Expertise in Server Hardening Exam IES

Contact PI


  • Exam

  • Onsite
Duration: 1 Day

A Red Hat Certified Engineer (RHCE®) who has earned the Red Hat Certificate of Expertise in Server Hardening has demonstrated the knowledge, skills, and abilities needed to understand and apply standards-based best practices to secure Red Hat Enterprise Linux® systems against unauthorized access.

This version of the exam is an Individual Exam Session (IES). IESs are available through remotely proctored personal testing stations at select training locations, providing a convenient, secure option for taking the same Red Hat exam available in a classroom setting, with the same hands-on experience required. The testing stations are simple to use, so you'll be able to relax and concentrate on your exam.

Certification: Red Hat Certificate of Expertise in Server Hardening

What You Will Learn

 

Audience

 

  • System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems
  • System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations
  • RHCEs who wish to earn Red Hat Certified Security Specialist (RHCSS®) or Red Hat Certified Architect (RHCA®) certification

Prerequistes

 

RHCE certification, Red Hat Certified Systems Administrator (RHCSA®) certification, or equivalent experience required

Course Outline

 

The exam tests your knowledge of and ability to perform the following tasks:

  • Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs), and selectively update systems based on this information.
  • Verify package security and validity.
  • Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes.
  • Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files.
  • Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files.
  • Manage user account security and user password security.
  • Manage system login security using pluggable authentication modules (PAM).
  • Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords.
  • Configure system-wide acceptable use notifications.
  • Install, configure, and manage identity management services and configure identity management clients.
  • Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression.
  • Configure system auditing services and review audit reports.
  • Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling.

Course Labs